Maen Takruri
American University of Ras Al Khaimah

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

PSO-SVM hybrid system for melanoma detection from histo-pathological images Maen Takruri; Mohamed Khaled Abu Mahmoud; Adel Al-Jumaily
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (712.709 KB) | DOI: 10.11591/ijece.v9i4.pp2941-2949

Abstract

This paper introduces an automated system for skin cancer (melanoma) detection from Histo-pathological images sampled from microscopic slides of skin biopsy. The proposed system is a hybrid system based on Particle Swarm Optimization and Support Vector Machine (PSO-SVM). The features used are extracted from the grayscale image histogram, the co-occurrence matrix and the energy of the wavelet coefficients resulting from the wavelet packet decomposition. The PSO-SVM system selects the best feature set and the best values for the SVM parameters (C and γ) that optimize the performance of the SVM classifier.   The system performance is tested on a real dataset obtained from the Southern Pathology Laboratory in Wollongong NSW, Australia. Evaluation results show a classification accuracy of 87.13%, a sensitivity of 94.1% and a specificity of 80.22%.The sensitivity and specificity results are comparable to those obtained by dermatologists.
Wavelet based multicarrier CDMA system Nasser Hamad; Maen Takruri; Mahdi Barhoush
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 4: August 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (562.594 KB) | DOI: 10.11591/ijece.v9i4.pp3051-3059

Abstract

Emerging demands for high data rate services, high user capacity and low power consumption systems are the key driving forces behind the continued technology evolution in wireless communications. Multicarrier Modulation techniques support variety of services requiring different data rates and different QoS (quality of service) levels. Multicarrier CDMA is a wireless communication system that can be seen as a combination of direct sequence CDMA and Orthogonal Frequency Division Multiplexing techniques. The main benefits of this system are its robustness to inter symbol interference and multipath propagation in fading channels. This paper studies and simulates the Discrete Wavelet Transform based Multicarrier CDMA and compares it with the  Discrete Fourier Transform based one using different number of sub carriers, and different modulation techniques. The results shows that the Wavelet based system outperforms the Fourier based one since it has lower bit error rate BER performance, lower peak to verage power ratio PAPR and higher user capacity.
Security vulnerabilities related to web-based data Mohammed Awad; Muhammed Ali; Maen Takruri; Shereen Ismail
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 17, No 2: April 2019
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v17i2.10484

Abstract

In this digital era, organizations and industries are moving towards replacing websites with web applications for many obvious reasons. With this transition towards web-based applications, organizations and industries find themselves surrounded by several threats and vulnerabilities. One of the largest concerns is keeping their infrastructure safe from attacks and misuse. Web security entails applying a set of procedures and practices, by applying several security principles at various layers to protect web servers, web users, and their surrounding environment. In this paper, we will discuss several attacks that may affect web-based applications namely: SQL injection attacks, cookie poisoning, cross-site scripting, and buffer overflow. Additionally, we will discuss detection and prevention methods from such attacks.